-
Notifications
You must be signed in to change notification settings - Fork 4.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
reality blocked ! #2768
Comments
i'm experiencing this too in Iran |
changing the destination of a connection would require a man-in-the-middle attack, which is a different type of interference. the connection destination is determined by the client configuration, not by the TLS handshake or any external factors. The client will establish a connection to the server specified in its configuration, and this cannot be changed by an external party without modifying the client configuration or performing a man-in-the-middle attack. Reality tunnel is designed to protect against man-in-the-middle attacks.
|
Many thanks to @RPRX, We have had a great experiences with it for the past months. and sadly its time to say goodbye to Reality :( |
This is not MITM and sniffing in xray core also resets the destination of the connection. https://xtls.github.io/en/config/inbound.html#sniffingobject If your ip is 1.2.3.4 and you send a discord.com request to it, filtering system can recognize that the domain is discord.com and change the address to another ip based on the dns of the filtering system (which is Cloudflare's ip for Discord). But even if it changes to the ip of the filtering system, it is not just MITM. For example, let's say that you created a dokodemo-door on port 443 of your server to a cloudflare ip, if you change the dns result and open discord.com with your own ip, is this MITM ? |
@internetfreedomir @Argo160 What I mean by "not steal" is that you need to have a website with SSL on port 8443 and use "dest" to your 8443, so that when you use your domain on a browser with port 443 (which is the default) you see your website and when you use reality config with 443 you use reality. Long story short, change everything, and don't use any public SNI like www.speedtest.net or anyone else's. you don't get blocked anymore. Don't even use graylisted SNIs even once, you need to have a fully fresh configuration. |
Exactly, filtering system is sniffing and resetting the destination of the connection. In this way that you said, reality can be connected to your domain because when the filtering system resets the destination of the connection, the new IP address will be your IP because the DNS record is to your IP even in the DNS of the filtering system. But this is not what reality was created for, because reality was created to use domains in the whitelist to bypass the restrictions of SNIs that are not in the whitelist. So goodbye reality ... |
According to official document the main goal of Reality is to eliminate the detectable TLS fingerprint on the server side, while still maintain the forward secrecy and guard against the certificate chain attack. Reality is just a more secure replacement for TLS security layer and it can't replace domain fronting to solve SNI whitelist problem. |
这样做理论上可行,但可能会导致正常应用出问题,并且痕迹会比较明显,截至目前有伊朗 GFW 部署了该策略的迹象吗? |
|
@internetfreedomir
So, in this scenario, detection is the process of the GFW recognizing reality traffic, and the subsequent redirection or rerouting is the GFW taking action to block the detected traffic. The GFW would not reroute all web traffic, only the traffic it has identified as unwanted or non-compliant with its regulations. The redirection to a Cloudflare IP or any other IP is a step that happens post-detection, as part of the blocking or interference process. |
dup |
@Fangliding I think despite the generic title, this thread discusses a very specific theory on how IR GFW interferes with REALITY, it is not a general "news" thread about internet in Iran. I suggest to reopen and move to discussion as a separate thread.
This proposed attack does not require the censor to detect REALITY traffic at all, the censor can perform the rerouting on suspicion alone. Let's say IR GFW really interferes with all TLS connections in such a way that destination IP is always replaced with the DNS result of the sniffed SNI:
Still, there is no indication that this attack is actually implemented, and it would still be fairly obvious to researchers if it was done indiscriminately. |
I( and many other people ) were noticed this issue since reality or even earlier projects with similar ideas were proposed. |
Reality can be detected by something like tls sniffing in xray core, the filtering system resets the destination of the connection and if the domain in reality was an address like discord.com it connects to one of the Cloudflare's ips instead of connecting to my reality server ip . this happens for all reality addresses.
The address section in the configuration is not important because it is reset by the filtering system and the new address is given based on the dns of the filtering system.
So this means goodbye reality ...
The text was updated successfully, but these errors were encountered: